Archive for March 1st, 2016

Chrystia Freeland, Canada’s International Trade Minister, yesterday unveiled the final legal draft of the Canada – EU Trade Agreement. While CETA is still awaiting translation, Freeland indicated that she hopes the agreement will come into force in 2017. The lengthy delay in arriving at a final legal draft arose from ongoing European opposition to investor-state dispute settlement provisions that many fear may limit governmental regulatory power and lead to expensive corporate lawsuits. The CETA text unveiled yesterday features some notable changes to the ISDS rules, with Canada largely acquiescing to European demands.

The ISDS changes raise in CETA at least two points that are relevant for TPP purposes. First, claims that completed trade agreements are non-negotiable and cannot be changed simply isn’t true. CETA was completed years ago, yet political demands for changes to the ISDS rules led all parties to go back to the bargaining table to work out a new system. While Freeland called the changes “modifications”, the reality is that a major aspect of the deal was re-worked in face of European protests. If elements of CETA can be reworked, there may be ways to re-do aspects of the TPP.

Second, CETA and the TPP are no longer consistent with respect to investor-state dispute settlement.

The U.S. government’s attempt to invoke a centuries-old law to obtain a court order to require Apple to create a program that would allow it to break the security safeguards on the iPhone used by a San Bernardino terrorist has sparked an enormous outcry from the technology, privacy, and security communities.

For U.S. officials, a terrorism related rationale for creating encryption backdoors or weakening user security represents the most compelling scenario for mandated assistance. Yet even in those circumstances, companies, courts, and legislatures should resist the urge to remove one of the last bastions of user security and privacy protection.

My weekly technology law column (Toronto Star version, homepage version) argues that this case is about far more than granting U.S. law enforcement access to whatever information remains on a single password-protected iPhone. Investigators already have a near-complete electronic record: all emails and information stored on cloud-based computers, most content on the phone from a cloud back-up completed weeks earlier, telephone records, social media activity, and data that reveals with whom the terrorist interacted. Moreover, given the availability of all of that information, it seems likely that much of the remaining bits of evidence on the phone can be gathered from companies or individuals at the other end of the conversation.

Appeared in the Toronto Star on February 28, 2016 as Apple iPhone Unlock Standoff Rotten to the Core The U.S. government’s attempt to invoke a centuries-old law to obtain a court order to require Apple to create a program that would allow it to break the security safeguards on the […]